diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-07-04 04:02:36 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-07-04 04:02:36 +0000 |
commit | 16ae3d0dba5f81e5602798b915105284033dea75 (patch) | |
tree | ce0c2bf0d7e961b1015d43d1a07269d81e7a9ce9 /authfd.h | |
parent | 90279d80f57c79ac6566051172a94a2cca9674b1 (diff) |
- itojun@cvs.openbsd.org 2001/06/26 06:32:58
[atomicio.h authfd.h authfile.h auth.h auth-options.h bufaux.h
buffer.h canohost.h channels.h cipher.h clientloop.h compat.h
compress.h crc32.h deattack.h dh.h dispatch.h groupaccess.h
hostfile.h kex.h key.h log.h mac.h match.h misc.h mpaux.h packet.h
radix.h readconf.h readpass.h rsa.h]
prototype pedant. not very creative...
- () -> (void)
- no variable names
Diffstat (limited to 'authfd.h')
-rw-r--r-- | authfd.h | 34 |
1 files changed, 14 insertions, 20 deletions
@@ -11,7 +11,7 @@ | |||
11 | * called by a name other than "ssh" or "Secure Shell". | 11 | * called by a name other than "ssh" or "Secure Shell". |
12 | */ | 12 | */ |
13 | 13 | ||
14 | /* RCSID("$OpenBSD: authfd.h,v 1.17 2001/06/26 04:59:59 markus Exp $"); */ | 14 | /* RCSID("$OpenBSD: authfd.h,v 1.18 2001/06/26 06:32:47 itojun Exp $"); */ |
15 | 15 | ||
16 | #ifndef AUTHFD_H | 16 | #ifndef AUTHFD_H |
17 | #define AUTHFD_H | 17 | #define AUTHFD_H |
@@ -62,7 +62,7 @@ int ssh_get_authentication_socket(void); | |||
62 | * ssh_get_authentication_socket(). Depending on the way the descriptor was | 62 | * ssh_get_authentication_socket(). Depending on the way the descriptor was |
63 | * obtained, this may close the descriptor. | 63 | * obtained, this may close the descriptor. |
64 | */ | 64 | */ |
65 | void ssh_close_authentication_socket(int authfd); | 65 | void ssh_close_authentication_socket(int); |
66 | 66 | ||
67 | /* | 67 | /* |
68 | * Opens and connects a private socket for communication with the | 68 | * Opens and connects a private socket for communication with the |
@@ -76,19 +76,19 @@ AuthenticationConnection *ssh_get_authentication_connection(void); | |||
76 | * Closes the connection to the authentication agent and frees any associated | 76 | * Closes the connection to the authentication agent and frees any associated |
77 | * memory. | 77 | * memory. |
78 | */ | 78 | */ |
79 | void ssh_close_authentication_connection(AuthenticationConnection *auth); | 79 | void ssh_close_authentication_connection(AuthenticationConnection *); |
80 | 80 | ||
81 | /* | 81 | /* |
82 | * Returns the number authentication identity held by the agent. | 82 | * Returns the number authentication identity held by the agent. |
83 | */ | 83 | */ |
84 | int ssh_get_num_identities(AuthenticationConnection *auth, int version); | 84 | int ssh_get_num_identities(AuthenticationConnection *, int); |
85 | 85 | ||
86 | /* | 86 | /* |
87 | * Returns the first authentication identity held by the agent or NULL if | 87 | * Returns the first authentication identity held by the agent or NULL if |
88 | * no identies are available. Caller must free comment and key. | 88 | * no identies are available. Caller must free comment and key. |
89 | * Note that you cannot mix calls with different versions. | 89 | * Note that you cannot mix calls with different versions. |
90 | */ | 90 | */ |
91 | Key *ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int version); | 91 | Key *ssh_get_first_identity(AuthenticationConnection *, char **, int); |
92 | 92 | ||
93 | /* | 93 | /* |
94 | * Returns the next authentication identity for the agent. Other functions | 94 | * Returns the next authentication identity for the agent. Other functions |
@@ -96,25 +96,20 @@ Key *ssh_get_first_identity(AuthenticationConnection *auth, char **comment, int | |||
96 | * function. This returns NULL if there are no more identities. The caller | 96 | * function. This returns NULL if there are no more identities. The caller |
97 | * must free key and comment after a successful return. | 97 | * must free key and comment after a successful return. |
98 | */ | 98 | */ |
99 | Key *ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int version); | 99 | Key *ssh_get_next_identity(AuthenticationConnection *, char **, int); |
100 | 100 | ||
101 | /* | 101 | /* |
102 | * Requests the agent to decrypt the given challenge. Returns true if the | 102 | * Requests the agent to decrypt the given challenge. Returns true if the |
103 | * agent claims it was able to decrypt it. | 103 | * agent claims it was able to decrypt it. |
104 | */ | 104 | */ |
105 | int | 105 | int |
106 | ssh_decrypt_challenge(AuthenticationConnection *auth, | 106 | ssh_decrypt_challenge(AuthenticationConnection *, Key *, BIGNUM *, u_char[16], |
107 | Key *key, BIGNUM * challenge, | 107 | u_int, u_char[16]); |
108 | u_char session_id[16], | ||
109 | u_int response_type, | ||
110 | u_char response[16]); | ||
111 | 108 | ||
112 | /* Requests the agent to sign data using key */ | 109 | /* Requests the agent to sign data using key */ |
113 | int | 110 | int |
114 | ssh_agent_sign(AuthenticationConnection *auth, | 111 | ssh_agent_sign(AuthenticationConnection *, Key *, u_char **, int *, |
115 | Key *key, | 112 | u_char *, int); |
116 | u_char **sigp, int *lenp, | ||
117 | u_char *data, int datalen); | ||
118 | 113 | ||
119 | /* | 114 | /* |
120 | * Adds an identity to the authentication server. This call is not meant to | 115 | * Adds an identity to the authentication server. This call is not meant to |
@@ -122,23 +117,22 @@ ssh_agent_sign(AuthenticationConnection *auth, | |||
122 | * successfully added. | 117 | * successfully added. |
123 | */ | 118 | */ |
124 | int | 119 | int |
125 | ssh_add_identity(AuthenticationConnection *auth, Key *key, | 120 | ssh_add_identity(AuthenticationConnection *, Key *, const char *); |
126 | const char *comment); | ||
127 | 121 | ||
128 | /* | 122 | /* |
129 | * Removes the identity from the authentication server. This call is not | 123 | * Removes the identity from the authentication server. This call is not |
130 | * meant to be used by normal applications. This returns true if the | 124 | * meant to be used by normal applications. This returns true if the |
131 | * identity was successfully added. | 125 | * identity was successfully added. |
132 | */ | 126 | */ |
133 | int ssh_remove_identity(AuthenticationConnection *auth, Key *key); | 127 | int ssh_remove_identity(AuthenticationConnection *, Key *); |
134 | 128 | ||
135 | /* | 129 | /* |
136 | * Removes all identities from the authentication agent. This call is not | 130 | * Removes all identities from the authentication agent. This call is not |
137 | * meant to be used by normal applications. This returns true if the | 131 | * meant to be used by normal applications. This returns true if the |
138 | * operation was successful. | 132 | * operation was successful. |
139 | */ | 133 | */ |
140 | int ssh_remove_all_identities(AuthenticationConnection *auth, int version); | 134 | int ssh_remove_all_identities(AuthenticationConnection *, int); |
141 | 135 | ||
142 | int ssh_update_card(AuthenticationConnection *auth, int add, int reader_id); | 136 | int ssh_update_card(AuthenticationConnection *, int, int); |
143 | 137 | ||
144 | #endif /* AUTHFD_H */ | 138 | #endif /* AUTHFD_H */ |